US20200196144A1 - System for 5g enabled rapid bandwidth deployment - Google Patents

System for 5g enabled rapid bandwidth deployment Download PDF

Info

Publication number
US20200196144A1
US20200196144A1 US16/428,242 US201916428242A US2020196144A1 US 20200196144 A1 US20200196144 A1 US 20200196144A1 US 201916428242 A US201916428242 A US 201916428242A US 2020196144 A1 US2020196144 A1 US 2020196144A1
Authority
US
United States
Prior art keywords
entity
network
connectivity
computer
private security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/428,242
Other versions
US11310662B2 (en
Inventor
Todd Michael Goodyear
Jisoo Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of America Corp
Original Assignee
Bank of America Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of America Corp filed Critical Bank of America Corp
Priority to US16/428,242 priority Critical patent/US11310662B2/en
Assigned to BANK OF AMERICA CORPORATION reassignment BANK OF AMERICA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LEE, JISOO, GOODYEAR, TODD MICHAEL
Publication of US20200196144A1 publication Critical patent/US20200196144A1/en
Application granted granted Critical
Publication of US11310662B2 publication Critical patent/US11310662B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Embodiments of the present invention provide a system for rapid bandwidth access deployment across multiple entities for secure, expedited bandwidth provisioning for entity connectivity. In this way, the invention provides a private, secure 5G connectivity network to generate specific remote points of connectivity for entity to entity connections. The 5G network may allow any user within the entity with authentication to connect from any random point-to-point faster, with much more time to transmit using an existing wave length within the 5G technology. Furthermore, in some embodiments, the system may provide a dedicated bandwidth pipeline that provides trades or communications within milliseconds for the entity users. This may be provided via a geographical location or the like and allow for 5G provisioning and presentment for faster than a traditional fiber based connectivity desired for entity communications.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/778,402, filed Dec. 12, 2018 entitled “System For 5G Enabled Rapid Bandwidth Access Deployment,” the entirety of which is incorporated herein by reference.
  • BACKGROUND
  • With the proliferation of Internet technology in recent times, people may utilize online systems to connect with other individuals across entities to perform meetings, operations, and trades. Conventional methods may include using virtual private network tunnels or dedicated circuits to prevent third parties from accessing the circuit. That said, there are a number of technical problems with using conventional systems in this manner.
  • Accordingly, there is a need for a more efficient and dynamic way to connect users and entities with each other.
  • BRIEF SUMMARY
  • The following presents a simplified summary of one or more embodiments of the invention in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments, nor delineate the scope of any or all embodiments. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later.
  • Currently, when entity to entity connections are created, they are typically via virtual private network (VPN) tunnel or a dedicated circuit that prevents third parties from communicating within the circuit. Dedicated circuits can be expensive and only dedicated for communication between two entities. If an entity desires to communicate with multiple parties, the traditional circuit network proves challenging. Furthermore, more and more entity enterprises are moving more towards compute logic that is off-site, cloud based computing or the like. Because of change of source and destination points, there is no longer a fixed or specific location associated with each party.
  • Some entities may, for example, desire to communicate with a second entity where they do not have direct or dedicated point to point circuit. Such as, for example, a financial institution institutional investments want to service one or more smaller investment management entities for trading order submission. At which point, if an issue arises, they become difficult to identify and patch.
  • The invention provides a private, secure 5G connectivity network to generate specific remote points of connectivity for entity to entity connections. The 5G network may allow any user within the entity with authentication to connect from any random point-to-point faster, with much more time to transmit using an existing wave length within the 5G technology.
  • Furthermore, in some embodiments, the system may provide a dedicated bandwidth pipe that provides trades or communications within milliseconds for the entity users. This may be provided via a geographical location or the like and allow for 5G provisioning and presentment for faster than a traditional fiber based connectivity desired for trading or the like.
  • Embodiments of the present invention address these and/or other needs by providing rapid bandwidth access deployment, the invention comprising: generating a private security 5G connectivity network for the rapid bandwidth access deployment; identifying an entity requesting communication with a second entity; providing the entity, upon authentication, with a remote point of connectivity for point-to-point connection on the private security 5G network; authenticating a user at the remote point of connectivity, wherein the authentication occurs via a user device associated with the entity over the private security 5G network at the remote point of connectivity; and providing, upon authentication, the user with a dedicated bandwidth pipeline for communication over the private security 5G network.
  • In some embodiments, identifying entities requesting communication further comprises authorizing the entity for the rapid bandwidth access deployment.
  • In some embodiments, the private security 5G connectivity network for specific remote points of connectivity for entity connection to provide trades or communications within milliseconds for the entity.
  • In some embodiments, providing the entity with a remote point of connectivity for point-to-point connection on the private security 5G network, further comprises deployment of a 5G-enabled hardware device to the remote point of connectivity that comprises an internal power source, wherein the 5G-enabled hardware device is configured to remain powered on and connected to the private security 5G network, and wherein the 5G-enabled hardware device is a router, smartphone, laptop, server, or IoT device.
  • In some embodiments, authenticating the entity further comprises authenticating the user device associated with the entity over the private security 5G network comprising receiving authentication credentials from the user device, the authentication credentials comprising a username and password, biometric data, secured authentication tokens, or cryptographic keys.
  • In some embodiments, the dedicated bandwidth pipeline for communication over the private security 5G network is not created via virtual private network (VPN) tunnel or a dedicated circuit.
  • In some embodiments, the dedicated bandwidth pipeline for communication allows for trades or communications within milliseconds for the entity users and is provided based on geographical location 5G provisioning and presentment for entity communications.
  • The features, functions, and advantages that have been discussed may be achieved independently in various embodiments of the present invention or may be combined with yet other embodiments, further details of which can be seen with reference to the following description and drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Having thus described embodiments of the invention in general terms, reference will now be made to the accompanying drawings, wherein:
  • FIG. 1 provides a rapid bandwidth access deployment operating environment, in accordance with one embodiment of the present invention; and
  • FIG. 2 provides a process flow for rapid bandwidth access deployment processing, in accordance with one embodiment of the present invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to elements throughout. Where possible, any terms expressed in the singular form herein are meant to also include the plural form and vice versa, unless explicitly stated otherwise. Also, as used herein, the term “a” and/or “an” shall mean “one or more,” even though the phrase “one or more” is also used herein.
  • “Entity” as used herein may refer to an individual or an organization that owns and/or operates an online system of networked computing devices, systems, and/or peripheral devices on which the system described herein is implemented. The entity may be a business organization, a non-profit organization, a government organization, and the like, which may routinely use various types of applications within its enterprise environment to accomplish its objectives.
  • “Entity system” as used herein may refer to the computing systems, devices, software, applications, communications hardware, and/or other resources used by the entity to perform location-based data management. Accordingly, the entity system may comprise 5G cellular networks (e.g., 5G towers, transmitters, receivers, or the like), blockchain database servers, Internet-of-Things (“IoT”) devices, networked terminals, mobile smartphones, smart devices (e.g., smart watches), and/or other types of computing systems or devices along with their associated applications.
  • “Computing system” or “computing device” as used herein may refer to a networked computing device within the entity system. The computing system may include a processor, a non-transitory storage medium, a communications device, and a display. The computing system may be configured to support user logins and inputs from any combination of similar or disparate devices. Accordingly, the computing system may be a portable electronic device such as a smartphone, tablet, single board computer, smart device, or laptop. In other embodiments, the computing system may be a stationary unit such as a personal desktop computer, networked terminal, IoT device, or the like.
  • “User” as used herein may refer to an individual who may interact with the entity system to access the functions therein. Accordingly, the user may be an agent, employee, associate, contractor, or other authorized party who may access, use, administrate, maintain, and/or manage the computing systems within the entity system. In other embodiments, the user may be a client or customer of the entity.
  • Accordingly, as used herein the term “user device” or “mobile device” may refer to mobile phones, personal computing devices, tablet computers, wearable devices, and/or any portable electronic device capable of receiving and/or storing data therein. “Service” as used herein includes any task, labor, product, or the like provided to a user from a third party service provider that may include a company, individual, or the like.
  • Currently, when entity to entity connections are created, they are typically via virtual private network (VPN) tunnel or a dedicated circuit that prevents third parties from communicating within the circuit. Dedicated circuits can be expensive and only dedicated for communication between two entities. If an entity desires to communicate with multiple parties, the traditional circuit network proves challenging. Furthermore, more and more entity enterprises are moving more towards compute logic that is off-site, cloud based computing or the like. Because of change of source and destination points, there is no longer a fixed or specific location associated with each party.
  • Some entities may, for example, desire to communicate with a second entity where they do not have direct or dedicated point to point circuit. Such as, for example, a financial institution institutional investments want to service one or more smaller investment management entities for trading order submission. At which point, if an issue arises, they become difficult to identify and patch.
  • The invention provides a private, secure 5G connectivity network to generate specific remote points of connectivity for entity to entity connections. The 5G network may allow any user within the entity with authentication to connect from any random point-to-point faster, with much more time to transmit using an existing wave length within the 5G technology.
  • Furthermore, in some embodiments, the system may provide a dedicated bandwidth pipe that provides trades or communications within milliseconds for the entity users. This may be provided via a geographical location or the like and allow for 5G provisioning and presentment for faster than a traditional fiber based connectivity desired for trading or the like.
  • Turning now to the figures, FIG. 1 illustrates a rapid bandwidth access deployment operating environment 100, in accordance with one embodiment of the present invention. In particular, FIG. 1 illustrates a 5G entity computing system 106 that is operatively coupled, via a 5G network 101 to the user device 104, second entity network system 105, and/or an entity system 103. In such a configuration, the 5G entity computing system 106 may transmit information to and receive information from the user device 104, second entity network system 105, and/or the entity system 103. It should be understood that FIG. 1 illustrates only an exemplary embodiment of the system environment 100, and it will be appreciated that in other embodiments one or more functions of the systems, devices, or servers as depicted in FIG. 1 may be combined into a single system, device, or server. In other embodiments, a single system, device, or server as depicted in FIG. 1 may represent multiple systems, devices, or servers.
  • The 5G network 101 may be a system specific distributive network receiving and distributing specific network feeds and identifying specific network associated triggers. The 5G network 101 include one or more 5G radio towers, antennae, cell sites, base stations, telephone networks, cloud networks, radio access networks (RAN), WiFi networks, or the like. Additionally, the 5G network 101 may also include a global area network (GAN), such as the Internet, a wide area network (WAN), a local area network (LAN), or any other type of network or combination of networks. Accordingly, the 5G network 101 may provide for wireline, wireless, or a combination wireline and wireless communication between devices on the 5G network 101.
  • The 5G network 101 as described herein confers many technological benefits over conventional network systems. For instance, the 5G network 101 may support network slicing to allow cellular service providers to generate virtualized cellular networks on a per-device basis, with each virtualized cellular network having certain defined features and performance standards. As a result, an entity may tailor the 5G network 101 to certain devices which may require higher bandwidth and/or lower latency connections than is available from conventional networks. Accordingly, the 5G network 101 may improve the efficiency and/or effectiveness of various processes in multiple different scenarios and use cases, as will be further described herein.
  • The user device 104 may be operated by a user 102. The user device 104 may be, for example, a portable device such as a cellular phone, smart phone, personal data assistant (PDA), laptop, or the like, though it is within the scope of the disclosure for the user device 104 to be a stationary device such as a desktop computer. The user device 104 generally comprises a communication device 112, a processing device 114, and a memory device 116. The processing device 114 is operatively coupled to the communication device 112 and the memory device 116. The processing device 114 uses the communication device 112 to communicate with the 5G network 101 and other devices on the 5G network 101, such as, but not limited to the 5G entity computing system 106. As such, the communication device 112 generally comprises a modem, antennae, WiFi or Ethernet adapter, radio transceiver, or other device for communicating with other devices on the 5G network 101.
  • The user device 104 comprises computer-readable instructions 120 and data storage 118 stored in the memory device 116, which in one embodiment includes the computer-readable instructions 120 of a user application 122. In some embodiments, the user application 122 allows a user 102 to receive communications from and/or send communications to the 5G entity computing system 106.
  • As further illustrated in FIG. 1, the 5G entity computing system 106 may comprise a communication device 146, a processing device 148, and a memory device 150. The 5G entity computing system 106 may be owned and/or operated by an entity such as a cellular service provider, financial institution, business organization, or the like. As used herein, the term “processing device” generally includes circuitry used for implementing the communication and/or logic functions of the particular system. For example, a processing device may include a digital signal processor device, a microprocessor device, and various analog-to-digital converters, digital-to-analog converters, and other support circuits and/or combinations of the foregoing. Control and signal processing functions of the system are allocated between these processing devices according to their respective capabilities. The processing device may include functionality to operate one or more software programs based on computer-readable instructions thereof, which may be stored in a memory device.
  • The processing device 148 is operatively coupled to the communication device 146 and the memory device 150. The processing device 148 uses the communication device 146 to communicate with the 5G network 101 and other devices on the 5G network 101, such as, but not limited to the user device 104 and/or the entity system 103. The system generally comprises a modem, antennae, WiFi or Ethernet adapter, radio transceiver, or other device for communicating with other devices on the 5G network 101.
  • As further illustrated in FIG. 1, the 5G entity computing system 106 comprises computer-readable instructions 154 stored in the memory device 150, which in one embodiment includes the computer-readable instructions 154 of a 5G application 158. In some embodiments, the memory device 150 includes data storage 152 for storing data related to the system environment, but not limited to data created and/or used by the 5G application 150. The 5G application 158 may comprise computer-executable program code which may instruct the processing device 148 to perform certain logic, data processing, and data storing functions of the application to accomplish the entity's objectives. For example, the 5G application 158 may allow the entity to query, track, configure, or perform other types of communicative functions with the user device 104 and/or the entity system 103.
  • In some embodiments, the operating environment may comprise one or more entity systems 103. The entity system 103 may refer to a system associated with an entity, such as a network, infrastructure, enterprise, or the like. Accordingly, the entity system 103 may also comprise a processing device 164 operatively coupled to the communication device 162 and a memory device 166 comprising data storage 168 and computer readable instructions 170. The computer readable instructions 170 may comprise an entity application 172 which may be configured to instruct the processing device 164 to execute certain functions over the 5G network 101, such as interacting with the 5G entity computing system 106, the second entity network system 105 and/or the user device 104.
  • The communication device 162, and other communication devices as described herein, may comprise a wireless local area network (WLAN) such as WiFi based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards, Bluetooth short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz or other wireless access technology. Alternatively or in addition to the wireless interface, the Entity system 103 may also include a communication interface device that may be connected by a hardwire connection to the resource distribution device. The interface device may comprise a connector such as a USB, SATA, PATA, SAS or other data connector for transmitting data to and from the entity system 103.
  • The user device 104, the second entity network system 105, and the entity system 103 may each further include a processing device communicably coupled to devices as a memory device, output devices, input devices, a network interface, a power source, a clock or other timer, a camera, a positioning system device, a gyroscopic device, one or more chips, and the like.
  • In some embodiments, the user device 104, the second entity network system 105, and the entity system 103 access one or more databases or datastores (not shown) to search for and/or retrieve information related to the service provided by the entity. The user device 104, the second entity network system 105, and the entity system 103 may also or alternatively access both a memory and/or datastore local to the user device 104 and/or the Entity system 103.
  • The processing devices as described herein may include functionality to operate one or more software programs or applications, which may be stored in the memory device. For example, a processing device may be capable of operating a connectivity program, such as a web browser application. In this way, the user device 104, second entity network system 105, and/or the entity system 103 may transmit and receive web content, such as, for example, product valuation, service agreements, location-based content, and/or other web page content, according to a Wireless Application Protocol (WAP), Hypertext Transfer Protocol (HTTP), and/or the like.
  • A processing device may also be capable of operating applications. The applications may be downloaded from a server and stored in the memory device of the user device 104, second entity network system 105, and/or the entity system 103. Alternatively, the applications may be pre-installed and stored in a memory in a chip.
  • The chip may include the necessary circuitry to provide 5G support and/or integration within the user device 104, second entity network system 105, and the entity system 103. Generally, the chip will include data storage which may include data associated with the service that the user device 104, the second entity network system 105, and the entity system 103 may be communicably associated therewith. The chip and/or data storage may be an integrated circuit, a microprocessor, a system-on-a-chip, a microcontroller, or the like. In this way, the chip may include data storage. Of note, it will be apparent to those skilled in the art that the chip functionality may be incorporated within other elements in the user device 104, the second entity network system 105, and the entity system 103. For instance, the functionality of the chip may be incorporated within the memory device and/or the processing device. In a particular embodiment, the functionality of the chip is incorporated in an element within the user device 104, the second entity network system 105, and the entity system 103. Still further, the chip functionality may be included in a removable storage device such as an SD card or the like.
  • A processing device may be configured to use the network interface to communicate with one or more other devices on a network. In this regard, the network interface may include an antenna operatively coupled to a transmitter and a receiver (together a “transceiver”). The processing device may be configured to provide signals to and receive signals from the transmitter and receiver, respectively. The signals may include signaling information in accordance with the air interface standard of the applicable cellular system of the wireless telephone network that may be part of the network. In this regard, the user device 104, the second entity network system 105, and/or the entity system 103 may be configured to operate with one or more air interface standards, communication protocols, modulation types, and access types. By way of illustration, the user device 104, the second entity network system 105, and/or the entity system 103 may be configured to operate in accordance with any of a number of first, second, third, fourth, and/or fifth-generation communication protocols and/or the like. For example, the user device 104, second entity network system 105, and/or the entity system 103 may be configured to operate in accordance with second-generation (2G) wireless communication protocols IS-136 (time division multiple access (TDMA)), GSM (global system for mobile communication), and/or IS-95 (code division multiple access (CDMA)), or with third-generation (3G) wireless communication protocols, such as Universal Mobile Telecommunications System (UMTS), CDMA2000, wideband CDMA (WCDMA) and/or time division-synchronous CDMA (TD-SCDMA), with fourth-generation (4G) wireless communication protocols, with fifth-generation (5G) wireless communication protocols, or the like. The user device 104, the second entity network system 105, and/or the entity system 103 may also be configured to operate in accordance with non-cellular communication mechanisms, such as via a wireless local area network (WLAN) or other communication/data networks.
  • The network interface may also include an application interface in order to allow a user or service provider to execute some or all of the above-described processes. The application interface may have access to the hardware, e.g., the transceiver, and software previously described with respect to the network interface. Furthermore, the application interface may have the ability to connect to and communicate with an external data storage on a separate system within the network.
  • The user device 104, the second entity network system 105, and/or the entity system 103 may have an interface that includes user output devices and/or input devices. The output devices may include a display (e.g., a liquid crystal display (LCD) or the like) and a speaker or other audio device, which are operatively coupled to the processing device. The input devices, which may allow the user device 104, the second entity network system 105, and/or the entity system 103 to receive data from a user 202 and/or service provider 209, may include any of a number of devices allowing the user device 104, the second entity network system 105, and/or the entity system 103 to receive data from a user 202 and/or the service provider 209, such as a keypad, keyboard, touch-screen, touchpad, microphone, mouse, joystick, other pointer device, button, soft key, and/or other input device(s).
  • The user device 104, the second entity network system 105, and/or the entity system 103 may further include a power source. Generally, the power source is a device that supplies electrical energy to an electrical load. In some embodiment, power source may convert a form of energy such as solar energy, chemical energy, mechanical energy, or the like to electrical energy. Generally, the power source in a user device 104, the second entity network system 105, and/or the entity system 103 may be a battery, such as a lithium battery, a nickel-metal hydride battery, or the like, that is used for powering various circuits, e.g., the transceiver circuit, and other devices that are used to operate the user device 104, the second entity network system 105, and/or the entity system 103. Alternatively, the power source may be a power adapter that can connect a power supply from a power outlet to the user device 104, the second entity network system 105, and/or the entity system 103. In such embodiments, a power adapter may be classified as a power source “in” the user device 104, the second entity network system 105, and/or the entity system 103.
  • As described above, the computing devices as shown in FIG. 1 may also include a memory device operatively coupled to the processing device. As used herein, “memory” may include any computer readable medium configured to store data, code, or other information. The memory device may include volatile memory, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data. The memory device may also include non-volatile memory, which can be embedded and/or may be removable. The non-volatile memory may additionally or alternatively include an electrically erasable programmable read-only memory (EEPROM), flash memory or the like.
  • The memory device may store any of a number of applications or programs which comprise computer-executable instructions/code executed by the processing device to implement the functions of the user device 104, the second entity network system 105, and/or the entity system 103 described herein.
  • FIG. 2 provides a process flow for rapid bandwidth access deployment processing 200, in accordance with one embodiment of the present invention. As illustrated in block 201, the process 200 is initiated by generating a private secure 5G connectivity network for private connectivity for expedited processing speed for the connection for processing, trades, or the like. As illustrated in block 202, the process 200 continues by identifying entities requesting communication via point to point communication. In this way, the system, via the 5G network connectivity, may be able to provide remote point to point communication for entity to entity communication with privacy.
  • As illustrated in block 203, the process 200 continues by generating the remote points of connectivity for the entity to entity connectivity. In this way, the system may generate remote points of connectivity for private entity to entity communications instead of direct circuit communications. As illustrated in block 204, the process 200 continues by authenticating users to 5G remote point of connectivity for communication between the two entities. The authentication may be required for users to access the private network for communication between two users associated with the two entities.
  • As illustrated in block 205, the process 200 continues by providing a dedicated bandwidth pipeline for entity communications. In some embodiments, the system may provide the bandwidth pipeline for entity communications based on geographic location of the entity to provide the direct bandwidth pipeline for the entity communication.
  • Currently, when entity to entity connections are created, they are typically via virtual private network (VPN) tunnel or a dedicated circuit that prevents third parties from communicating within the circuit. Dedicated circuits can be expensive and only dedicated for communication between two entities. If an entity desires to communicate with multiple parties, the traditional circuit network proves challenging. Furthermore, more and more entity enterprises are moving more towards compute logic that is off-site, cloud based computing or the like. Because of change of source and destination points, there is no longer a fixed or specific location associated with each party.
  • Some entities may, for example, desire to communicate with a second entity where they do not have direct or dedicated point to point circuit. Such as, for example, a financial institution institutional investments want to service one or more smaller investment management entities for trading order submission. At which point, if an issue arises, they become difficult to identify and patch.
  • The invention provides a private, secure 5G connectivity network to generate specific remote points of connectivity for entity to entity connections. The 5G network may allow any user within the entity with authentication to connect from any random point-to-point faster, with much more time to transmit using an existing wave length within the 5G technology.
  • Furthermore, in some embodiments, the system may provide a dedicated bandwidth pipe that provides trades or communications within milliseconds for the entity users. This may be provided via a geographical location or the like and allow for 5G provisioning and presentment for faster than a traditional fiber based connectivity desired for trading or the like.
  • As will be appreciated by one of ordinary skill in the art, the present invention may be embodied as an apparatus (including, for example, a system, a machine, a device, a computer program product, and/or the like), as a method (including, for example, a business process, a computer-implemented process, and/or the like), or as any combination of the foregoing. Accordingly, embodiments of the present invention may take the form of an entirely software embodiment (including firmware, resident software, micro-code, and the like), an entirely hardware embodiment, or an embodiment combining software and hardware aspects that may generally be referred to herein as a “system.” Furthermore, embodiments of the present invention may take the form of a computer program product that includes a computer-readable storage medium having computer-executable program code portions stored therein. As used herein, a processor may be “configured to” perform a certain function in a variety of ways, including, for example, by having one or more special-purpose circuits perform the functions by executing one or more computer-executable program code portions embodied in a computer-readable medium, and/or having one or more application-specific circuits perform the function. As such, once the software and/or hardware of the claimed invention is implemented the computer device and application-specific circuits associated therewith are deemed specialized computer devices capable of improving technology associated with the in authorization and instant integration of a new credit card to digital wallets.
  • It will be understood that any suitable computer-readable medium may be utilized. The computer-readable medium may include, but is not limited to, a non-transitory computer-readable medium, such as a tangible electronic, magnetic, optical, infrared, electromagnetic, and/or semiconductor system, apparatus, and/or device. For example, in some embodiments, the non-transitory computer-readable medium includes a tangible medium such as a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), and/or some other tangible optical and/or magnetic storage device. In other embodiments of the present invention, however, the computer-readable medium may be transitory, such as a propagation signal including computer-executable program code portions embodied therein.
  • It will also be understood that one or more computer-executable program code portions for carrying out the specialized operations of the present invention may be required on the specialized computer include object-oriented, scripted, and/or unscripted programming languages, such as, for example, Java, Perl, Smalltalk, C++, SAS, SQL, Python, Objective C, and/or the like. In some embodiments, the one or more computer-executable program code portions for carrying out operations of embodiments of the present invention are written in conventional procedural programming languages, such as the “C” programming languages and/or similar programming languages. The computer program code may alternatively or additionally be written in one or more multi-paradigm programming languages, such as, for example, F#.
  • It will further be understood that some embodiments of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of systems, methods, and/or computer program products. It will be understood that each block included in the flowchart illustrations and/or block diagrams, and combinations of blocks included in the flowchart illustrations and/or block diagrams, may be implemented by one or more computer-executable program code portions. These one or more computer-executable program code portions may be provided to a processor of a special purpose computer for the authorization and instant integration of credit cards to a digital wallet, and/or some other programmable data processing apparatus in order to produce a particular machine, such that the one or more computer-executable program code portions, which execute via the processor of the computer and/or other programmable data processing apparatus, create mechanisms for implementing the steps and/or functions represented by the flowchart(s) and/or block diagram block(s).
  • It will also be understood that the one or more computer-executable program code portions may be stored in a transitory or non-transitory computer-readable medium (e.g., a memory, and the like) that can direct a computer and/or other programmable data processing apparatus to function in a particular manner, such that the computer-executable program code portions stored in the computer-readable medium produce an article of manufacture, including instruction mechanisms which implement the steps and/or functions specified in the flowchart(s) and/or block diagram block(s).
  • The one or more computer-executable program code portions may also be loaded onto a computer and/or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer and/or other programmable apparatus. In some embodiments, this produces a computer-implemented process such that the one or more computer-executable program code portions which execute on the computer and/or other programmable apparatus provide operational steps to implement the steps specified in the flowchart(s) and/or the functions specified in the block diagram block(s). Alternatively, computer-implemented steps may be combined with operator and/or human-implemented steps in order to carry out an embodiment of the present invention.
  • While certain exemplary embodiments have been described and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of, and not restrictive on, the broad invention, and that this invention not be limited to the specific constructions and arrangements shown and described, since various other changes, combinations, omissions, modifications and substitutions, in addition to those set forth in the above paragraphs, are possible. Those skilled in the art will appreciate that various adaptations and modifications of the just described embodiments can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.

Claims (20)

What is claimed is:
1. A system for rapid bandwidth access deployment, the system comprising:
a memory device with computer-readable program code stored thereon;
a communication device;
a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to:
generate a private security 5G connectivity network for the rapid bandwidth access deployment;
identify an entity requesting communication with a second entity;
provide the entity, upon authentication, with a remote point of connectivity for point-to-point connection on the private security 5G network;
authenticate a user at the remote point of connectivity, wherein the authentication occurs via a user device associated with the entity over the private security 5G network at the remote point of connectivity; and
provide, upon authentication, the user with a dedicated bandwidth pipeline for communication over the private security 5G network.
2. The system of claim 1, wherein identifying entities requesting communication further comprises authorizing the entity for the rapid bandwidth access deployment.
3. The system of claim 1, wherein the private security 5G connectivity network for specific remote points of connectivity for entity connection to provide trades or communications within milliseconds for the entity.
4. The system of claim 1, wherein providing the entity with a remote point of connectivity for point-to-point connection on the private security 5G network, further comprises deployment of a 5G-enabled hardware device to the remote point of connectivity that comprises an internal power source, wherein the 5G-enabled hardware device is configured to remain powered on and connected to the private security 5G network, and wherein the 5G-enabled hardware device is a router, smartphone, laptop, server, or IoT device.
5. The system of claim 1, wherein authenticating the entity further comprises authenticating the user device associated with the entity over the private security 5G network comprising receiving authentication credentials from the user device, the authentication credentials comprising a username and password, biometric data, secured authentication tokens, or cryptographic keys.
6. The system of claim 1, wherein the dedicated bandwidth pipeline for communication over the private security 5G network is not created via virtual private network (VPN) tunnel or a dedicated circuit.
7. The system of claim 1, wherein the dedicated bandwidth pipeline for communication allows for trades or communications within milliseconds for the entity users and is provided based on geographical location 5G provisioning and presentment for entity communications.
8. A computer program product for rapid bandwidth access deployment, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
an executable portion configured for generating a private security 5G connectivity network for the rapid bandwidth access deployment;
an executable portion configured for identifying an entity requesting communication with a second entity;
an executable portion configured for providing the entity, upon authentication, with a remote point of connectivity for point-to-point connection on the private security 5G network;
an executable portion configured for authenticating a user at the remote point of connectivity, wherein the authentication occurs via a user device associated with the entity over the private security 5G network at the remote point of connectivity; and
an executable portion configured for providing, upon authentication, the user with a dedicated bandwidth pipeline for communication over the private security 5G network.
9. The computer program product of claim 8, wherein identifying entities requesting communication further comprises authorizing the entity for the rapid bandwidth access deployment.
10. The computer program product of claim 8, wherein the private security 5G connectivity network for specific remote points of connectivity for entity connection to provide trades or communications within milliseconds for the entity.
11. The computer program product of claim 8, wherein providing the entity with a remote point of connectivity for point-to-point connection on the private security 5G network, further comprises deployment of a 5G-enabled hardware device to the remote point of connectivity that comprises an internal power source, wherein the 5G-enabled hardware device is configured to remain powered on and connected to the private security 5G network, and wherein the 5G-enabled hardware device is a router, smartphone, laptop, server, or IoT device.
12. The computer program product of claim 8, wherein authenticating the entity further comprises authenticating the user device associated with the entity over the private security 5G network comprising receiving authentication credentials from the user device, the authentication credentials comprising a username and password, biometric data, secured authentication tokens, or cryptographic keys.
13. The computer program product of claim 8, wherein the dedicated bandwidth pipeline for communication over the private security 5G network is not created via virtual private network (VPN) tunnel or a dedicated circuit.
14. The computer program product of claim 8, wherein the dedicated bandwidth pipeline for communication allows for trades or communications within milliseconds for the entity users and is provided based on geographical location 5G provisioning and presentment for entity communications.
15. A computer-implemented method for rapid bandwidth access deployment, the method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations:
generating a private security 5G connectivity network for the rapid bandwidth access deployment;
identifying an entity requesting communication with a second entity;
providing the entity, upon authentication, with a remote point of connectivity for point-to-point connection on the private security 5G network;
authenticating a user at the remote point of connectivity, wherein the authentication occurs via a user device associated with the entity over the private security 5G network at the remote point of connectivity; and
providing, upon authentication, the user with a dedicated bandwidth pipeline for communication over the private security 5G network.
16. The computer-implemented method of claim 15, wherein identifying entities requesting communication further comprises authorizing the entity for the rapid bandwidth access deployment.
17. The computer-implemented method of claim 15, wherein the private security 5G connectivity network for specific remote points of connectivity for entity connection to provide trades or communications within milliseconds for the entity.
18. The computer-implemented method of claim 15, wherein providing the entity with a remote point of connectivity for point-to-point connection on the private security 5G network, further comprises deployment of a 5G-enabled hardware device to the remote point of connectivity that comprises an internal power source, wherein the 5G-enabled hardware device is configured to remain powered on and connected to the private security 5G network, and wherein the 5G-enabled hardware device is a router, smartphone, laptop, server, or IoT device.
19. The computer-implemented method of claim 15, wherein authenticating the entity further comprises authenticating the user device associated with the entity over the private security 5G network comprising receiving authentication credentials from the user device, the authentication credentials comprising a username and password, biometric data, secured authentication tokens, or cryptographic keys.
20. The computer-implemented method of claim 15, wherein the dedicated bandwidth pipeline for communication over the private security 5G network is not created via virtual private network (VPN) tunnel or a dedicated circuit.
US16/428,242 2018-12-12 2019-05-31 System for 5G enabled rapid bandwidth deployment Active 2040-07-09 US11310662B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/428,242 US11310662B2 (en) 2018-12-12 2019-05-31 System for 5G enabled rapid bandwidth deployment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862778402P 2018-12-12 2018-12-12
US16/428,242 US11310662B2 (en) 2018-12-12 2019-05-31 System for 5G enabled rapid bandwidth deployment

Publications (2)

Publication Number Publication Date
US20200196144A1 true US20200196144A1 (en) 2020-06-18
US11310662B2 US11310662B2 (en) 2022-04-19

Family

ID=71072059

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/428,242 Active 2040-07-09 US11310662B2 (en) 2018-12-12 2019-05-31 System for 5G enabled rapid bandwidth deployment

Country Status (1)

Country Link
US (1) US11310662B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202022104059U1 (en) 2022-07-19 2022-08-18 Jaydip Kumar Machine learning based intelligent system for 5G network security
CN115277802A (en) * 2021-04-29 2022-11-01 中国联合网络通信集团有限公司 Data transmission method and gateway

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR0013461A (en) 1999-08-23 2002-04-30 Motorola Inc Domain selection system and method
US8789151B2 (en) * 2008-01-09 2014-07-22 Microsoft Corporation Remote device communication platform
US9268545B2 (en) * 2011-03-31 2016-02-23 Intel Corporation Connecting mobile devices, internet-connected hosts, and cloud services
US8930493B2 (en) 2012-03-20 2015-01-06 International Business Machines Corporation Inter-domain replication of service information
US10455414B2 (en) * 2014-10-29 2019-10-22 Qualcomm Incorporated User-plane security for next generation cellular networks
US9917861B2 (en) 2015-10-06 2018-03-13 Cisco Technology, Inc. Enabling access to an enterprise network domain based on a centralized trust
ES2731444T3 (en) * 2016-06-02 2019-11-15 Deutsche Telekom Ag Communication network comprising a management entity with callback functionality
US10212590B2 (en) * 2016-08-16 2019-02-19 Lg Electronics Inc. Method and apparatus for authenticating device in wireless communication system
US20180092067A1 (en) * 2016-09-28 2018-03-29 Futurewei Technologies, Inc. System and Method for D2D Communication
US20180248598A1 (en) * 2017-02-27 2018-08-30 Taoglas Group Holdings Limited Scalable linearly polarized phased array antennas and methods
EP3582543A4 (en) * 2017-03-20 2020-02-26 Huawei Technologies Co., Ltd. Ambr determination method, and communication entity
US10721751B2 (en) * 2017-06-05 2020-07-21 At&T Intellectual Property I, L.P. Facilitation of efficient spectrum utilization for 5G or other next generation networks
CN114339910A (en) * 2017-07-31 2022-04-12 华为技术有限公司 Communication method, device and system
PL3503609T3 (en) * 2017-12-22 2020-05-18 Deutsche Telekom Ag Radio access network slice
US10986602B2 (en) * 2018-02-09 2021-04-20 Intel Corporation Technologies to authorize user equipment use of local area data network features and control the size of local area data network information in access and mobility management function
US10770203B2 (en) * 2018-07-19 2020-09-08 Commscope Technologies Llc Plug-in power and data connectivity micro grids for information and communication technology infrastructure and related methods of deploying such micro grids
US10827335B1 (en) * 2019-06-19 2020-11-03 International Business Machines Corporation Cognitive emergency management on a 5G telecom network
US11594348B2 (en) * 2020-05-18 2023-02-28 Commscope Technologies Llc Cable for distributing network power and data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277802A (en) * 2021-04-29 2022-11-01 中国联合网络通信集团有限公司 Data transmission method and gateway
DE202022104059U1 (en) 2022-07-19 2022-08-18 Jaydip Kumar Machine learning based intelligent system for 5G network security

Also Published As

Publication number Publication date
US11310662B2 (en) 2022-04-19

Similar Documents

Publication Publication Date Title
US20210110063A1 (en) Secure communications in a blockchain network
US11263050B2 (en) System for generating electronic alerts through predictive optimization analysis of resource conversions
US11423163B2 (en) System for controlling computing process execution by users with elevated access privilege
US11899802B2 (en) System for monitoring networked computing devices with integrated electronic data encryption and decryption mechanism
US11310662B2 (en) System for 5G enabled rapid bandwidth deployment
US11599622B2 (en) System for resource monitoring and transmitting electronic alerts using event-based triggers
US11568065B2 (en) System for securing electronic data by aggregation of distributed electronic database entries
US11716622B2 (en) System for identification of secure wireless network access points using cryptographic pre-shared keys
US20230041437A1 (en) System for end-to-end electronic data encryption using an intelligent homomorphic encryped privacy screen
US11799712B2 (en) System for integration and interoperability between disparate distributed server technologies
US11558183B2 (en) System for exchanging symmetric cryptographic keys using computer network port knocking
US11575684B2 (en) System for secure resource allocation communication with a network
US11233706B2 (en) System for multichannel aggregation of electronic data via a centralized integration hub
US20220035730A1 (en) Mobile log heatmap-based auto testcase generation
US11528267B2 (en) System for automated image authentication and external database verification
US11144537B2 (en) System for data consensus validation in an electronic distributed server network using a screening node
US11451550B2 (en) System for automated electronic data exfiltration path identification, prioritization, and remediation
US11601418B2 (en) System for increasing authentication complexity for access to online systems
US11979484B2 (en) System for electronic data encryption and decryption using a consensus draft process
US10455424B1 (en) System for out-of-band asset tracking via a 5G network
US11757634B2 (en) System for secure client-side cryptographic key retrieval using cryptographic key splitting and wrapping
US11165587B2 (en) System for authorizing resource requests based on cryptographic computations and federated hash verifications
US11169914B1 (en) System for synchronization and provisioning of electronic testing data across applications
US20230179427A1 (en) System for processing offline digital resource transfers using a hardware device based cryptographic application
US11531558B2 (en) System for hybrid computing application with desktop and web-based components

Legal Events

Date Code Title Description
AS Assignment

Owner name: BANK OF AMERICA CORPORATION, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GOODYEAR, TODD MICHAEL;LEE, JISOO;SIGNING DATES FROM 20190515 TO 20190529;REEL/FRAME:049335/0643

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE